🐈‍⬛David Sommerseth

310 Followers
396 Following
6.8K Posts

F/OSS hacker, mostly working on #OpenVPN
- speaks only for himself.
ex-Twitter account (now inaccessible): https://twitter.com/DavidSommerseth

"Don't aim to be someone. DO something."

#nobridge - because I believe in the real #fediverse, and I don't want my own views/data to be abused by yet another "closed-service which can do whatever it wants for profit".

**If you want to follow me**, you now **MUST** have some content on your profile where we have some common ground on interests. I will no longer accept random profiles wanting to follow with no toots or no other follows or followers in the same interest sphere.

Contacthttps://david.sommerseth.email/
PGP Fingerprint690D B606 E838 182F A8F9 018C 755A 3AB9 4530 7622

Today, @kinnison and I have moved the Subplot project from gitlab.com to Radicle.

Subplot is our tool for documenting acceptance criteria and how they are verified for all stakeholders of a system. Coincidentally, Subplot can also generate code to perform the verification.

The new location is here:
https://radicle.network/nodes/radicle.liw.fi/rad%3Azjxyd2A1A7FnxtC69qDfoAajfTHo

#Subplot #Radicle

Radicle Explorer

Explore the Radicle network

We’re now scoring wireless headphones! We evaluated 14 popular models using a new scoring rubric. The results highlight a clear gap between what’s possible and what’s currently being built. Let us know which headphones you'd like to see scored and read our blog at the link below!

https://www.ifixit.com/News/117206/were-now-scoring-wireless-headphones-for-repairability

#iFixit #RightoRepair #FixTheWorld

The year is 2026, and my 8x2GHz 8Gb RAM pocket device ("phone") can't play a 128 kbps mp3 (pre-downloaded) over Bluetooth without sound glitches every minute
PSA on Copy Fail (CVE-2026-31431)

This is a short PSA (Public Service Announcement) on how I dealt with the Copy Fail vulnerability. This will be updated as soon as the updated kernel packages are made available. This is a pragmatic post on how to deploy a mitigiation RIGHT NOW.

Jan Wildeboer's Blog

Ah, the #copyfail clickbait posts are coming. Here’s my serious contribution. On your Linux machine add

initcall_blacklist=algif_aead_init

to your kernel boot commandline (typically in grub). Reboot. You are now safe until the updated kernel packages become available. For distributions with the `grubby` command this is done as root with

# grubby --update-kernel=ALL --args="initcall_blacklist=algif_aead_init"

This mitigation comes courtesy of Red Hat. Our engineers keep you safe :)

1/4

So CopyFail CVE-2026-31431 is a thing.

If you're on the Ubuntu platform, 26.04 is not affected. 18.04 through 25.10 are indeed affected, but no fixes are available.

If you're on another platform, check with your vendor for update availability.

Unlike what the buffoons at Theori published as a "mitigation", the folks at Red Hat actually published a viable mitigation for CopyFail CVE-2026-31431.

Specifically, edit your grub (or whatever you use to load your kernel) configuration to have one of the following arguments:
initcall_blacklist=algif_aead_init
initcall_blacklist=af_alg_init
initcall_blacklist=crypto_authenc_esn_module_init

With such boot arguments to the Linux kernel, the affected bits won't be reachable.

Unacceptable. Jonathan Ross should be in custody awaiting trial for the murder of Renée Good.

That was the most uneventful system version upgrade I ever did. Download, reboot, install, done. I can go on about my day.

And everything still works and is set up exactly how it was. The whole process took ~30 minutes.

Imagine!

#Linux #Fedora